首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1534篇
  免费   363篇
  国内免费   130篇
化学   453篇
晶体学   15篇
力学   394篇
综合类   44篇
数学   226篇
物理学   895篇
  2023年   27篇
  2022年   50篇
  2021年   97篇
  2020年   68篇
  2019年   49篇
  2018年   53篇
  2017年   74篇
  2016年   59篇
  2015年   70篇
  2014年   100篇
  2013年   146篇
  2012年   79篇
  2011年   122篇
  2010年   90篇
  2009年   96篇
  2008年   119篇
  2007年   98篇
  2006年   111篇
  2005年   68篇
  2004年   63篇
  2003年   63篇
  2002年   48篇
  2001年   33篇
  2000年   34篇
  1999年   26篇
  1998年   27篇
  1997年   22篇
  1996年   15篇
  1995年   22篇
  1994年   12篇
  1993年   13篇
  1992年   9篇
  1991年   8篇
  1990年   9篇
  1989年   4篇
  1988年   9篇
  1987年   3篇
  1986年   3篇
  1985年   7篇
  1984年   2篇
  1983年   2篇
  1982年   6篇
  1981年   2篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1975年   1篇
  1974年   2篇
  1969年   1篇
  1957年   1篇
排序方式: 共有2027条查询结果,搜索用时 281 毫秒
101.
With the emergence of wireless networks, cooperation for secrecy is recognized as an attractive way to establish secure communications. Departing from cryptographic techniques, secrecy can be provided by exploiting the wireless channel characteristics; that is, some error-correcting codes besides reliability have been shown to achieve information-theoretic security. In this paper, we propose a polar-coding-based technique for the primitive relay wiretap channel and show that this technique is suitable to provide information-theoretic security. Specifically, we integrate at the relay an additional functionality, which allows it to smartly decide whether it will cooperate or not based on the decoding detector result. In the case of cooperation, the relay operates in a decode-and-forward mode and assists the communication by transmitting a complementary message to the destination in order to correctly decode the initial source’s message. Otherwise, the communication is completed with direct transmission from source to the destination. Finally, we first prove that the proposed encoding scheme achieves weak secrecy, then, in order to overcome the obstacle of misaligned bits, we implement a double-chaining construction, which achieves strong secrecy.  相似文献   
102.
Modeling a causal association as arising from a communication process between cause and effect, simplifies the discovery of causal skeletons. The communication channels enabling these communication processes, are fully characterized by stochastic tensors, and therefore allow us to use linear algebra. This tensor-based approach reduces the dimensionality of the data needed to test for conditional independence, e.g., for systems comprising three variables, pair-wise determined tensors suffice to infer the causal skeleton. The only thing needed is a minor extension to information theory, namely the concept of path information.  相似文献   
103.
环形磁场金属等离子体源作为一种全新的等离子体源结构,可用于产生高度离化、无大颗粒、高密度的离子束流,但传统流道结构不能保证其高效、均匀散热,大功率工作时可能引起密封胶圈的烧蚀失效,需对其冷却流场进行优化设计.利用Solidworks Flow Simulation软件对等离子体源冷却流道进行模拟,分析出入水孔分布角度、孔数、孔径以及入水孔高度对冷却效果的影响规律,并对流道结构参数进行优化.结果表明,增大水孔的周向分布范围,有利于提高散热的均匀性;入水孔设置在结构上层有利于减少冷却水的温度分层现象,使铜套和密封胶圈都处于较好的冷却状态;适当减小孔径有利于增大冷却水射流速度,增大湍流程度强化传热,提高换热效率.优化后的流场结构可以提高冷却水的利用率,在相同流量条件下获得更好的冷却效果,改善等离子体源的放电稳定性,为环形磁场金属等离子体源的冷却结构设计提供理论依据.  相似文献   
104.
We show how to formulate two-point boundary-value problems in order to compute fully-developed laminar channel and tube flow profiles for viscoelastic fluid models. The formulation is applied to Couette and pressure-driven flows separately, or a combination of both. The application of this methodology is illustrated analytically for the Upper-Convected Maxwell Model, and it is applied computationally for the Phan-Thien/Tanner and Giesekus Models. Numerical solutions exist for the last two models [J.Y. Yoo, H.C. Choi, On the steady simple shear flows of the one-mode Giesekus fluid, Rheol. Acta 28 (1989) 13–24; P.J. Oliveira, F.T. Pinho, Analytical solution for fully developed channel and pipe flow of Phan-Thien–Tanner fluids, J. Fluid Mech. 387 (1999) 271–280; M.A. Alves, F.T. Pinho, P.J. Oliveira, Study of steady pipe and channel flows of a single-mode Phan-Thien–Tanner fluid, J. Non-Newtonian Fluid Mech. 101 (2001) 55–76], allowing verification of the computational technique. Subsequently, the computational algorithm is applied to the constant-volume polymer blend models of Maffettone and Minale [P.L. Maffettone, M. Minale, Equation of change for ellipsoidal drops in viscous flow, J. Non-Newtonian Fluid Mech. 84 (1999) 105–106 (Erratum), J. Non-Newtonian Fluid Mech. 78 (1998) 227–241] and Dressler and Edwards [M. Dressler, B.J. Edwards, The influence of matrix viscoelasticity on the rheology of polymer blends, Rheol. Acta 43 (2004) 257–282; M. Dressler, B.J. Edwards, Rheology of polymer blends with matrix-phase viscoelasticity and a narrow droplet size distribution, J. Non-Newtonian Fluid Mech. 120 (2004) 189–205]. Rheological and morphological properties of the model blends are thus obtained as functions of the spatial position within the channel, applied pressure drop, and shear rate at the wall.  相似文献   
105.
In order to determine the characteristics of the peristaltic transport of shear thinning non-Newtonian materials, the motion of a third-order fluid in a planar channel having walls that are transversely displaced by an infinite, harmonic traveling wave of large wavelength and negligibly small Reynolds number was analyzed using a perturbation expansion in terms of a variant of the Deborah number. Within the range of validity of this analysis, we found the pumping rate of a shear-thinning fluid is less than that for a Newtonian fluid having a shear viscosity the same as the lower-limiting viscosity of the nonNewtonian material. Also, the space of variables for which trapping of a bolus of fluid occurs is reduced for the shear-thinning fluid investigated here.  相似文献   
106.
107.
During membrane depolarization associated with skeletal excitation-contraction (EC) coupling, dihydropyridine receptor [DHPR, a L-type Ca2+ channel in the transverse (t)-tubule membrane] undergoes conformational changes that are transmitted to ryanodine receptor 1 [RyR1, an internal Ca2+-release channel in the sarcoplasmic reticulum (SR) membrane] causing Ca2+ release from the SR. Canonical-type transient receptor potential cation channel 3 (TRPC3), an extracellular Ca2+-entry channel in the t-tubule and plasma membrane, is required for full-gain of skeletal EC coupling. To examine additional role(s) for TRPC3 in skeletal muscle other than mediation of EC coupling, in the present study, we created a stable myoblast line with reduced TRPC3 expression and without α1SDHPR (MDG/TRPC3 KD myoblast) by knock-down of TRPC3 in α1SDHPR-null muscular dysgenic (MDG) myoblasts using retrovirus-delivered small interference RNAs in order to eliminate any DHPR-associated EC coupling-related events. Unlike wild-type or α1SDHPR-null MDG myoblasts, MDG/TRPC3 KD myoblasts exhibited dramatic changes in cellular morphology (e.g., unusual expansion of both cell volume and the plasma membrane, and multi-nuclei) and failed to differentiate into myotubes possibly due to increased Ca2+ content in the SR. These results suggest that TRPC3 plays an important role in the maintenance of skeletal muscle myoblasts and myotubes.  相似文献   
108.
The temperature effects during the sol–gel process and ageing of the silica-based monolith on the structure and separation efficiency of the capillary columns (100 μm i.d., 150 mm) for HPLC separations were studied. The tested columns were synthesized from a mixture of tetramethoxysilane, polyethylene glycol and urea under the acidic conditions. The temperature was varied from 40 °C to 44 °C and formation of bypass channels between the silica mold and the capillary wall was examined. The temperature of 43 °C was estimated as optimal for preparation of efficient silica capillary columns which were subsequently modified by octadecyldimethyl-N,N-diethylaminosilane or covered by poly(octadecyl methacrylate) and tested using standard mixture of alkylbenzenes under the isocratic conditions.  相似文献   
109.
Hua Lu 《Optics Communications》2011,284(8):2254-2256
We present an asymptotic security proof of deterministic quantum key distribution (DQKD) with a two-way quantum channel. The security proof of DQKD with a two-way quantum channel is different from that of BB84, because Eve can attack the travel qubits twice, both in line Bob to Alice and in line Alice to Bob. With the no-signaling principle and the property of mutual information, we obtain an upper bound of the final key generation of entanglement-based DQKD and hence single-photon four-state DQKD. Our results can be applied to the protocol of QKD with two-step quantum channels.  相似文献   
110.
Cooperative relaying is considered as an effective technique to enlarge the coverage area and enhance the system capacity for the future wireless systems. In this paper, an infrastructure based multi-antenna cooperative relay network has been investigated. Closed form expressions of outage probability and average error rate have been derived, when the relay and the destination perform selection combining of the signals. The relay is assumed to operate in the adaptive decode and forward mode. The effect of number of antennas installed on the relay and their placement has also been studied.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号